The 1st telegraph communications exchange occurred between Queen Victoria and President Buchanan in 1858.

At the time, only a handful of people responded to either message. The tweets might have rested in obscurity indefinitely had the New York Times and The Intercept not alleged last weekend that the messages had an extraordinary purpose unconnected to remarking on telegraphic history. Explains The Intercept:

Each tweet looked completely benign but was in fact a message to the Russians.

As part of a sequence of 12, the tweets are now claimed to be a coded back-channel used to communicate with a Russian who was negotiating to sell to the NSA a set of cyberweapons stolen from it in 2016 by a group calling itself The Shadow Brokers.

These tools were leaked to the world and used by cybercriminals to launch attacks, such as May 2017’s WannaCry ransomware attack (later blamed by the US on North Korea).

Assuming the latest account stands up, it suggests that as recently as a few months ago, the NSA was still keen to find out precisely how much was lost in the incident and was willing to pay for the privilege.

But, surely sending coded messages on a public system is a strange way to communicate something this sensitive?

There might be two reasons for an agency like the NSA to use Twitter.

The first is that a verified Twitter account appears to be a valued stamp of authenticity. The ‘Russian’ apparently needed something to verify with whom he was talking, and an official Twitter handle will do it seems.

Less obviously, using coded tweets is a convenient way to hide in plain sight. The two parties could have used direct messaging (DM) but this would have logged the connection they had to one another (i.e. from one Twitter account to another).

Ironically, in 2014 Twitter was said to be working on a way of making DMs encrypted end-to-end but backed down, possibly because the company didn’t want to antagonise a US government already unhappy with the spread of hard-to-crack encryption. That would have made the channel more secure for the NSA too.

The idea of encoding messages using a public system – or going a stage further and actually hiding them in its communication – has been around for a while even if documented examples are rare.

5 comments on “Did the NSA really use Twitter to send coded messages to a Russian?”

And if I had read it, I would have pointed out that no, you can’t send telegrams anymore, and then everyone would wonder if that was some sort of coded response. So now maybe I’ll just respond, “The red fox crows at 3AM.”

You definitively quote The Intercept as stating that this was a method was used to communicate with “the Russians”, which makes it like some sort of channel to the authorities, then in the next sentence say they were communicating with “a Russian”.

Which is it? What do you think of The Intercept’s claims and what are these messages supposed to be saying? They could be there to talk to anyone and everyone, so what links them to the Russians/a Russian and not to Cuba/Venezuela/North Korea/China/Transnistria/Lunda Chokwe/Canada.